Skip to main content

Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

Abstract

Reversible watermarking which can restore the original media after the watermark is extracted, is a potential technique for integrity verification and tamper detecting. In this paper we proposed a reversible fragile watermarking scheme for audio authentication by using Integer Discrete Cosine Transform (intDCT) and expansion embedding. The main contribution consists of: 1) we observe that an audio frame would be distorted after undergoing the intDCT, amplitude expansion (AE) embedding and inverse intDCT operations. The distortion is analyzed in detail and the corresponding solution is proposed for; 2) In the integer DCT domain, two reversible audio watermarking algorithms based on difference expansion (DE) and prediction-error expansion (PE) are designed for the distortion and audio authentication. Experimental results show that the proposed reversible watermarking approaches can be used for integrity verification and tampering location while achieving better fidelity than the AE scheme for the same embedding payload.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Trans. Circuits and Systems for Video Technology 13(8), 890–896 (2003)

    Article  Google Scholar 

  2. Alattar, A.M.: Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans. Image Process. 13(8), 1147–1156 (2004)

    Article  MathSciNet  Google Scholar 

  3. Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Processing 16(3), 721–730 (2007)

    Article  MathSciNet  Google Scholar 

  4. Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.: Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)

    Article  Google Scholar 

  5. Lee, S., Yoo, C.D., Kalker, T.: Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform. IEEE Trans. Information Forensics and Security 2(3), 321–330 (2007)

    Article  Google Scholar 

  6. Yang, B., Schmucker, M., Funk, W., et al.: Integer DCT-based Reversible Watermarking for Images Using Companding Technique. In: Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 405–415 (2004)

    Google Scholar 

  7. van der Veen, M., Bruekers, F., van Leest, A., Cavin, S.: High Capacity Reversible Watermarking for Audio. In: Proc. SPIE Security and Watermarking of Multimedia Contents V, vol. 5020, pp. 1–11 (2003)

    Google Scholar 

  8. Bradley, B., Alattar, A.M.: High-Capacity, Invertible, Data-Hiding Algorithm for Digital Audio. In: Proc. SPIE Security and Watermarking of Multimedia Contents VII, vol. 5681, pp. 789–800 (2005)

    Google Scholar 

  9. Yan, D., Wang, R.: Reversible Data Hiding for Audio Based on Prediction Error Expansion. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 249–252 (2008)

    Google Scholar 

  10. Steinebach, M., Dittmann, J.: Watermarking-Based Digital Audio Data Authentication. EURASIP Journal on Applied Signal Processing, 1001–1015 (2003)

    Google Scholar 

  11. Huang, X., Nishimura, A., Echizen, I.: A Reversible Acoustic Steganography for Integrity Verification. In: Kim, H.-J., Shi, Y., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 305–316. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Huang, H., Rahardja, S., Yu, R.: A Fast Algorithm of Integer MDCT for Lossless Audio Coding. In: IEEE ICASSP 2004, pp. IV177–IV180 (2004)

    Google Scholar 

  13. Xiang, S., Huang, J.: Histogram-Based Audio Watermarking against Time-Scale Modification and Cropping Attacks. IEEE Trans. on Multimedia 9(7), 1357–11372 (2007)

    Article  Google Scholar 

  14. Xiang, S.: Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 224–239. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  15. Weng, S., Zhao, Y., Pan, J.-S.: Reversible Watermarking Resistant to Cropping Attack. IET Information Security 1(2), 91–95 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, Q., Xiang, S., Luo, X. (2013). Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics